• 8 Posts
  • 1.32K Comments
Joined 1 year ago
cake
Cake day: July 6th, 2023

help-circle





  • I stand by what I said. If you examine who supports those organizations, they are getting a benefit.

    The US Navy supports tor more than anybody else. Not to mention all of the government-run exit notes. Now you’re the product here, is the product watching your data? Or is the product providing noise for their clandestine operations? Tor is a great thing, 100%, but it is being supported by people who get a benefit from it.

    I’m sure you can find a counter example, but the point is it’s about incentives. If the incentives aren’t aligned you can’t trust it. Not for mission critical objectives



  • I wish it were that easy, there’s a lot of shared architecture in CPU design. So maybe there’s cache lines that are shared, those have to be disabled.

    Architecturally, maybe memory tagging for cash lines that in addition to looking at the TLB and physical addresses also looks at memory spaces. So if you’re addressing something that’s in the cache Even for another complete processor, you have to take the full hit going out to main memory.

    But even then it’s not perfect, because if you’re invalidating the cache of another core there is going to be some memory penalty, probably infotesimal compared to going to main memory, but it might be measurable. I’m almost certain it would be measurable. So still a side channel attack

    One mitigation that does come to mind, is running each program in a virtual machine, that way it’s guaranteed to have completely different physical address space. This is really heavy-handed, and I have seen some papers about the side channel attacks getting leaked information from co guest VMs in AWS. But it certainly reduces the risk surface







  • I set this up a while ago, so the services are a little dated there might be something better.

    I also use speedify, and I use 10, yes 10, different mullvad VPN connections.

    I have three internet connections at home. Each of the three connections has a wire guard connection to my two closest mullvad cities and one connection across the Pacific.

    Speedify sees the wireguard tunnels, and each of the three uplinks. And I can use that to aggregate all the different pathways and do a first pass the post race for every packet.

    Every packet gets replicated 13 times, and it races across the ocean, and the first one there gets delivered to the destination.

    It’s great for gaming! I was able to shave off 65 milliseconds of latency to game servers across the ocean.

    Is this wasteful? Absolutely, but it’s fun! The reason I use 10 mullvad connections is just because you get 5 simultaneous logins per account.

    There’s a couple different ways to set this up, Linux network name spaces, really intricate wire guard configurations, VLANs. I went with VLANs, it was the most robust and portable across different devices.



  • jet@hackertalks.comtoOpen Source@lemmy.mlAlternative to Discord ?
    link
    fedilink
    English
    arrow-up
    18
    arrow-down
    3
    ·
    14 days ago

    Discord’s main killer feature is Discovery of who is currently voice chatting in a room.

    I’ve not seen any alternative platform that has the same level of voice discovery that discord does. Discord makes it easy to have a community, oh I see Bob’s online, let’s jump in and say hi.

    It really is the local bar, you can just walk up and talk to anybody. That is absolutely critical. It’s open discovery, it’s effortless communication of status.